Building Java Programs

Slides:



Advertisements
Similar presentations
Hash Tables and Sets Lecture 3. Sets A set is simply a collection of elements Unlike lists, elements are not ordered Very abstract, general concept with.
Advertisements

Hashing as a Dictionary Implementation
CSE 143 Lecture 22: Advanced List Implementation (ADTs; interfaces; abstract classes; inner classes; generics; iterators)
1 Chapter 9 Maps and Dictionaries. 2 A basic problem We have to store some records and perform the following: add new record add new record delete record.
Sets and Maps Chapter 9. Chapter 9: Sets and Maps2 Chapter Objectives To understand the Java Map and Set interfaces and how to use them To learn about.
CSE 373 Data Structures and Algorithms Lecture 18: Hashing III.
Introducing Hashing Chapter 21 Copyright ©2012 by Pearson Education, Inc. All rights reserved.
Hash Tables. Container of elements where each element has an associated key Each key is mapped to a value that determines the table cell where element.
Hashing. Hashing as a Data Structure Performs operations in O(c) –Insert –Delete –Find Is not suitable for –FindMin –FindMax –Sort or output as sorted.
CS2110 Recitation Week 8. Hashing Hashing: An implementation of a set. It provides O(1) expected time for set operations Set operations Make the set empty.
(c) University of Washingtonhashing-1 CSC 143 Java Hashing Set Implementation via Hashing.
DATA STRUCTURES AND ALGORITHMS Lecture Notes 7 Prepared by İnanç TAHRALI.
Hashing Hashing is another method for sorting and searching data.
CSE 143 Lecture 24 Advanced collection classes (ADTs; abstract classes; inner classes; generics; iterators) read 11.1, 9.6, , slides.
Hashing as a Dictionary Implementation Chapter 19.
The Map ADT and Hash Tables. 2 The Map ADT  Map: An abstract data type where a value is "mapped" to a unique key  Need a key and a value to insert new.
CSC 427: Data Structures and Algorithm Analysis
Chapter 12 Hash Table. ● So far, the best worst-case time for searching is O(log n). ● Hash tables  average search time of O(1).  worst case search.
1 CSC 427: Data Structures and Algorithm Analysis Fall 2011 Space vs. time  space/time tradeoffs  hashing  hash table, hash function  linear probing.
Building Java Programs Bonus Slides Hashing. 2 Recall: ADTs (11.1) abstract data type (ADT): A specification of a collection of data and the operations.
Hashtables. An Abstract data type that supports the following operations: –Insert –Find –Remove Search trees can be used for the same operations but require.
Hash Tables © Rick Mercer.  Outline  Discuss what a hash method does  translates a string key into an integer  Discuss a few strategies for implementing.
1 CSE 331 Hash codes; annotations slides created by Marty Stepp based on materials by M. Ernst, S. Reges, D. Notkin, R. Mercer, Wikipedia
Sets and Maps Chapter 9. Chapter Objectives  To understand the Java Map and Set interfaces and how to use them  To learn about hash coding and its use.
CSE 373: Data Structures and Algorithms Lecture 16: Hashing III 1.
Building Java Programs Generics, hashing reading: 18.1.
Sets and Maps Chapter 9.
Sections 10.5 – 10.6 Hashing.
Hashing.
CSE 143 Lecture 20 Binary Search Trees continued; Tree Sets
TCSS 342, Winter 2006 Lecture Notes
School of Computer Science and Engineering
Week 8 - Wednesday CS221.
CSC 427: Data Structures and Algorithm Analysis
A tree set Our SearchTree class is essentially a set.
Efficiency add remove find unsorted array O(1) O(n) sorted array
Hash Tables.
Hash table another data structure for implementing a map or a set
Hash tables Hash table: a list of some fixed size, that positions elements according to an algorithm called a hash function … hash function h(element)
Hashing CS2110 Spring 2018.
Hashing CS2110.
Data Structures and Algorithms
CSE 373: Data Structures and Algorithms
Chapter 21 Hashing: Implementing Dictionaries and Sets
Lecture 26: Advanced List Implementation
A tree set Our SearchTree class is essentially a set.
Data Structures and Algorithms
slides created by Marty Stepp and Hélène Martin
CH 9.2 : Hash Tables Acknowledgement: These slides are adapted from slides provided with Data Structures and Algorithms in C++, Goodrich, Tamassia and.
CSE 373: Data Structures and Algorithms
slides adapted from Marty Stepp and Hélène Martin
CSE 373 Data Structures and Algorithms
CSE 373: Data Structures and Algorithms
Implementing Hash and AVL
CH 9.2 : Hash Tables Acknowledgement: These slides are adapted from slides provided with Data Structures and Algorithms in C++, Goodrich, Tamassia and.
CSE 373 Hash set implementation, continued
CS202 - Fundamental Structures of Computer Science II
slides created by Marty Stepp
CSE 143 Lecture 25 Set ADT implementation; hashing read 11.2
CSE 143 Lecture 25 Advanced collection classes
Sets and Maps Chapter 9.
CSE 373 Separate chaining; hash codes; hash maps
slides created by Marty Stepp
Building Java Programs
Hashing based on slides by Marty Stepp
CS210- Lecture 16 July 11, 2005 Agenda Maps and Dictionaries Map ADT
slides created by Marty Stepp and Hélène Martin
CSE 143 Lecture 21 Advanced List Implementation
CSE 373 Set implementation; intro to hashing
Sets and Maps Chapter 7 CS 225.
Presentation transcript:

Building Java Programs Generics, hashing reading: 18.1

Hashing hash: To map a value to an integer index. hash table: An array that stores elements via hashing. hash function: An algorithm that maps values to indexes. one possible hash function for integers: HF(I)  I % length set.add(11); // 11 % 10 == 1 set.add(49); // 49 % 10 == 9 set.add(24); // 24 % 10 == 4 set.add(7); // 7 % 10 == 7 index 1 2 3 4 5 6 7 8 9 value 11 24 49

Efficiency of hashing Add: set elementData[HF(i)] = i; public static int hashFunction(int i) { return Math.abs(i) % elementData.length; } Add: set elementData[HF(i)] = i; Search: check if elementData[HF(i)] == i Remove: set elementData[HF(i)] = 0; What is the runtime of add, contains, and remove? O(1) Are there any problems with this approach?

Hash Functions Maps a key to a number result should be constrained to some range passing in the same key should always give the same result Keys should be distributed over a range very bad if everything hashes to 1! should "look random" How would we write a hash function for String objects? first letter? length of word? Sum of ASCII values?

Hashing objects It is easy to hash an integer I (use index I % length ). How can we hash other types of values (such as objects)? All Java objects contain the following method: public int hashCode() Returns an integer hash code for this object. We can call hashCode on any object to find its preferred index. How is hashCode implemented? Depends on the type of object and its state. Example: a String's hashCode adds the ASCII values of its letters. You can write your own hashCode methods in classes you write. All classes come with a default version based on memory address.

Hash function for objects public static int hashFunction(E e) { return Math.abs(e.hashCode()) % elements.length; } Add: set elements[HF(o)] = o; Search: check if elements[HF(o)].equals(o) Remove: set elements[HF(o)] = null;

String's hashCode The hashCode function inside String objects looks like this: public int hashCode() { int hash = 0; for (int i = 0; i < this.length(); i++) { hash = 31 * hash + this.charAt(i); } return hash; As with any general hashing function, collisions are possible. Example: "Ea" and "FB" have the same hash value. Early versions of Java examined only the first 16 characters. For some common data this led to poor hash table performance.

Collisions collision: When hash function maps 2 values to same index. set.add(11); set.add(49); set.add(24); set.add(7); set.add(54); // collides with 24! collision resolution: An algorithm for fixing collisions. index 1 2 3 4 5 6 7 8 9 value 11 54 49

Probing probing: Resolving a collision by moving to another index. linear probing: Moves to the next index. set.add(11); set.add(49); set.add(24); set.add(7); set.add(54); // collides with 24; must probe Is this a good approach? variation: quadratic probing moves increasingly far away index 1 2 3 4 5 6 7 8 9 value 11 24 54 49

Clustering clustering: Clumps of elements at neighboring indexes. slows down the hash table lookup; you must loop through them. set.add(11); set.add(49); set.add(24); set.add(7); set.add(54); // collides with 24 set.add(14); // collides with 24, then 54 set.add(86); // collides with 14, then 7 How many indexes must a lookup for 94 visit? Now a lookup for 94 must look at 7 out of 10 total indexes. index 1 2 3 4 5 6 7 8 9 value index 1 2 3 4 5 6 7 8 9 value 11 24 54 14 86 49

Chaining chaining: Resolving collisions by storing a list at each index. add/search/remove must traverse lists, but the lists are short impossible to "run out" of indexes, unlike with probing index 1 2 3 4 5 6 7 8 9 value 11 24 7 49 54 14

Hash set code import java.util.*; // for List, LinkedList public class HashIntSet { private static final int CAPACITY = 137; private List<Integer>[] elements; // constructs new empty set public HashSet() { elements = (List<Integer>[]) (new List[CAPACITY]); } // adds the given value to this hash set public void add(int value) { int index = hashFunction(value); if (elements[index] == null) { elements[index] = new LinkedList<Integer>(); elements[index].add(value); // hashing function to convert objects to indexes private int hashFunction(int value) { return Math.abs(value) % elements.length; ...

Hash set code 2 ... // Returns true if this set contains the given value. public boolean contains(int value) { int index = hashFunction(value); return elements[index] != null && elements[index].contains(value); } // Removes the given value from the set, if it exists. public void remove(int value) { if (elements[index] != null) { elements[index].remove(value);

Rehashing rehash: Growing to a larger array when the table is too full. Cannot simply copy the old array to a new one. (Why not?) load factor: ratio of (# of elements ) / (hash table length ) many collections rehash when load factor ≅ .75 can use big prime numbers as hash table sizes to reduce collisions 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 24 7 49 11 54 14

Rehashing code ... // Grows hash array to twice its original size. private void rehash() { List<Integer>[] oldElements = elements; elements = (List<Integer>[]) new List[2 * elements.length]; for (List<Integer> list : oldElements) { if (list != null) { for (int element : list) { add(element); }

Other questions How would we implement toString on a HashSet? index 1 1 2 3 4 5 6 7 8 9 value 11 24 7 49 current element: 24 current index: 4 sub-index: 0 iterator 54 14

Implementing a hash map A hash map is just a set where the lists store key/value pairs: // key value map.put("Marty", 14); map.put("Jeff", 21); map.put("Kasey", 20); map.put("Stef", 35); Instead of a List<Integer>, write an inner Entry node class with key and value fields; the map stores a List<Entry> index 1 2 3 4 5 6 7 8 9 value "Stef" 35 "Marty" 14 "Jeff" 21 "Kasey" 20

Implementing generics // a parameterized (generic) class public class name<Type> { ... } Forces any client that constructs your object to supply a type. Don't write an actual type such as String; the client does that. Instead, write a type variable name such as E (for "element") or T (for "type"). You can require multiple type parameters separated by commas. The rest of your class's code can refer to that type by name.